Research trends, challenges, and emerging topics in digital forensics: A review of reviews

F Casino, TK Dasaklis, GP Spathoulas… - Ieee …, 2022 - ieeexplore.ieee.org
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

A survey on industrial control system digital forensics: challenges, advances and future directions

M Cook, A Marnerides, C Johnson… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Operational Technology (OT) systems have become increasingly interconnected and
automated, consequently resulting in them becoming targets of cyber attacks, with the threat …

[PDF][PDF] SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.

Z Lin, J Rhee, X Zhang, D Xu, X Jiang - Ndss, 2011 - researchgate.net
Brute force scanning of kernel memory images for finding kernel data structure instances is
an important function in many computer security and forensics applications. Brute force …

A survey of main memory acquisition and analysis techniques for the windows operating system

S Vömel, FC Freiling - Digital Investigation, 2011 - Elsevier
Traditional, persistent data-oriented approaches in computer forensics face some limitations
regarding a number of technological developments, eg, rapidly increasing storage …

The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice

RB Adams, V Hobbs, G Mann - … : The Journal of …, 2013 - researchportal.murdoch.edu.au
As with other types of evidence, the courts make no presumption that digital evidence is
reliable without some evidence of empirical testing in relation to the theories and techniques …

Correctness, atomicity, and integrity: defining criteria for forensically-sound memory acquisition

S Vömel, FC Freiling - Digital Investigation, 2012 - Elsevier
While procedures for forensic memory analysis have been well described in the literature,
the actual data acquisition process has been researched to a lesser degree. In particular …

Smartphone forensics: A proactive investigation scheme for evidence acquisition

A Mylonas, V Meletiadis, B Tsoumas, L Mitrou… - Information Security and …, 2012 - Springer
Smartphones constantly interweave into everyday life, as they accompany individuals in
different contexts. Smartphones include a combination of heterogeneous data sources …

[PDF][PDF] SCADA live forensics: real time data acquisition process to detect, prevent or evaluate critical situations

P Taveras - European Scientific Journal, 2013 - academia.edu
SCADA (Supervisory Control and Data Acquisition System) systems were originally created
to be deployed in non-networked environments. Therefore they lack of adequate security …

[HTML][HTML] An evaluation platform for forensic memory acquisition software

S Vömel, J Stüttgen - Digital Investigation, 2013 - Elsevier
Memory forensics has gradually moved into the focus of researchers and practitioners alike
in recent years. With an increasing effort to extract valuable information from a snapshot of a …

A conceptual model for digital forensic readiness

A Pooe, L Labuschagne - 2012 Information Security for South …, 2012 - ieeexplore.ieee.org
The ever-growing threats of fraud and security incidents present many challenges to law
enforcement and organisations across the globe. This has given rise to the need for …